#VU25412 SQL injection in Popup Builder - Responsive WordPress Pop up - Subscription & Newsletter - CVE-2020-9006
Published: February 18, 2020 / Updated: August 28, 2022
Popup Builder - Responsive WordPress Pop up - Subscription & Newsletter
Sygnoos
Description
The vulnerability allows a remote attacker to execute arbitrary SQL queries in database.
The vulnerability exists due to insufficient sanitization of user-supplied data in the "sgImportPopups" function in "sg_popup_ajax.php". A remote attacker can send a specially crafted request to the affected application and execute arbitrary SQL commands within the application database via PHP Deserialization on attacker-controlled data with the attachmentUrl POST variable.
Successful exploitation of this vulnerability may allow a remote attacker to read, delete, modify data in database and gain complete control over the affected application.
Remediation
External links
- https://plugins.trac.wordpress.org/browser/popup-builder/tags/2.2.8/files/sg_popup_ajax.php#L69
- https://wordpress.org/plugins/popup-builder/#developers
- https://wpvulndb.com/vulnerabilities/10073
- https://zeroauth.ltd/blog/2020/02/16/cve-2020-9006-popup-builder-wp-plugin-sql-injection-via-php-deserialization/